Professional Documents
Culture Documents
UNIT-2
UNIT-2
Deadlocks - System Model, Deadlocks Characterization, Methods for Handling Deadlocks, Deadlock
Prevention, Deadlock Avoidance, Deadlock Detection, and Recovery from Deadlock.
CPU SCHEDULING
CPU scheduling is the basis of Multiprogrammed operating systems. By switching the CPU
among processes, the operating system can make the computer more productive.
● In a single-processor system, only one process can run at a time. Others must wait until the
● The CPU will sit idle and wait for a process that needs an I/O operation to complete. If
the I/O operation completes then only the CPU will start executing the process. A lot of
CPU time has been wasted with this procedure.
● The objective of multiprogramming is to have some process running at all times to
maximize CPU utilization.
● When several processes are in main memory, if one process is waiting for I/O then the
operating system takes the CPU away from that process and gives the CPU to another
process. Hence there will be no wastage of CPU time.
Concepts of CPU Scheduling
1. CPU–I/O Burst Cycle
2. CPU Scheduler
3. Preemptive Scheduling
4. Dispatcher
CPU–I/O Burst Cycle
Process execution consists of a cycle of CPU execution and I/O wait.
● Process execution begins with a CPU burst. That is followed by an I/O burst. Processes
alternate between these two states.
● The final CPU burst ends with a system request to terminate execution.
● Hence the First cycle and Last cycle of execution must be CPU burst.
CPU Scheduler
Whenever the CPU becomes idle, the operating system must select one of the processes in the
ready queue to be executed. The selection process is carried out by the Short-Term
Scheduler or CPU scheduler.
Preemptive Scheduling
CPU-scheduling decisions may take place under the following four cases:
1. When a process switches from the running state to the waiting state.
Example: as the result of an I/O request or an invocation of wait( ) for the termination of
a child process.
2. When a process switches from the running state to the ready
state. Example: when an interrupt occurs
3. When a process switches from the waiting state to the ready
state. Example: at completion of I/O.
4. When a process terminates.
SCHEDULING CRITERIA
Different CPU-scheduling algorithms have different properties and the choice of a particular
algorithm may favor one class of processes over another.
Many criteria have been suggested for comparing CPU-scheduling algorithms:
● CPU utilization: CPU must be kept as busy as possible. CPU utilization can range from
0 to 100 percent. In a real system, it should range from 40 to 90 percent.
● Throughput: The number of processes that are completed per time unit.
● Turn-Around Time: It is the interval from the time of submission of a process to the
time of completion. Turnaround time is the sum of the periods spent waiting to get into
memory, waiting in the ready queue, executing on the CPU and doing I/O.
● Waiting time: It is the amount of time that a process spends waiting in the ready queue.
● Response time: It is the time from the submission of a request until the first response is
produced. Interactive systems use response time as its measure.
Note: It is desirable to maximize CPU utilization and Throughput and to minimize Turn-
Around Time, Waiting time and Response time.
CPU SCHEDULING ALGORITHMS
CPU scheduling deals with the problem of deciding which of the processes in the ready
queue is to be allocated to the CPU. Different CPU-scheduling algorithms are:
1. First-Come, First-Served Scheduling (FCFS)
3. Priority Scheduling
Gantt Chart is a bar chart that is used to illustrate a particular schedule including the start
and finish times of each of the participating processes.
First-Come, First-Served Scheduling (FCFS)
In FCFS, the process that requests the CPU first is allocated the CPU first.
● FCFS scheduling algorithm is Non-preemptive.
● Once the CPU has been allocated to a process, it keeps the CPU until it releases the CPU.
● FCFS can be implemented by using FIFO queues.
● When a process enters the ready queue, its PCB is linked onto the tail of the queue.
● When the CPU is free, it is allocated to the process at the head of the queue.
Example:1 Consider the following set of processes that arrive at time 0. The processes are
arrived at in the order P1, P2, P3, with the length of the CPU burst given in milliseconds.
The average waiting time under the FCFS policy is often quite long.
● The waiting time is 0 milliseconds for process P1, 24 milliseconds for process P2 and
27 milliseconds for process P3.
● Thus, the average waiting time is (0 + 24 + 27)/3 = 17 milliseconds.
Convoy Effect in FCFS
Convoy effect means, when a big process is executing in CPU, all the smaller processes must
have to wait until the big process execution completes. This will affect the performance of
the system.
Example:2 Let us consider the same example above but with the processes arriving in the
order P2, P3, P1.
The processes coming at P2, P3, P1 the average waiting time (6 + 0 + 3)/3 = 3 milliseconds
whereas the processes come in the order P1, P2, P3 the average waiting time is 17
milliseconds. Disadvantage of FCFS:
FCFS scheduling algorithm is Non-preemptive, it allows one process to keep CPU for a long
time. Hence it is not suitable for time sharing systems.
tn be the length of the nth CPU burst (i.e. contains the most recent information).
stores the past history.
be our predicted value for the next CPU burst.
α controls the relative weight of recent and past history in our prediction (0 ≤ α ≤1)
● If α=0, then , recent history has no effect
● The next CPU burst of the newly arrived process may be shorter than the currently
executing process.
● SRTF will preempt the currently executing process and execute the shortest job.
Consider the four processes with arrival times and burst times in milliseconds:
Process Arrival time Burst Time (ms)
P1 0 8
P2 1 4
P3 2 9
P4 3 5
Gantt Chart for SRTF
P2 3
P3 3
Gantt chart of Round Robin Scheduling
● If we use a time quantum of 4 milliseconds, then process P1 gets the first 4 milliseconds.
● Since it requires another 20 milliseconds, it is preempted after the first quantum and
the CPU is given to the next process in the queue, process P2.
● CPU burst of Process P2 is 3, so it does not need 4 milliseconds then it quits before
its time quantum expires. The CPU is then given to the next process P3.
● Once each process has received 1 time quantum, the CPU is returned to process P1 for an
additional time quantum.
The performance of the RR algorithm depends on the size of the Time Quantum.
● If the time quantum is extremely large, the RR policy is the same as the FCFS policy.
● If the time quantum is extremely small (i.e. 1 millisecond) the RR approach can result in
a large number of context switches.
● The time taken for context switch value should be a small fraction of Time quanta
then the performance of the RR will be increased.
Note: A rule of thumb is that 80 percent of the CPU bursts should be shorter than the time
quantum.
Multi-Level Queue Scheduling (MLQ)
In the Multilevel Queue Scheduling algorithm the processes are classified into different
groups.
● A Multilevel queue scheduling partitions the ready queue into several separate queues.
● The processes are permanently assigned to one queue based on memory size,
process priority or process type. Each queue has its own scheduling algorithm.
Example: Foreground processes have highest priority over background processes and these
processes have different response times hence it needs different scheduling.
The above figure shows Multi-level queue scheduling algorithm with five queues, listed
below in order of priority:
1. System processes
2. Interactive processes
3. Interactive editing processes
4. Batch processes
5. Student processes
Consider a multilevel feedback queue scheduler with three queues: queue0, queue1, queue2.
● The scheduler first executes all processes in queue0 then queue1 and then queue2.
● Only when queue and queue1 is empty, the scheduler will execute processes in queue2.
● A process that arrives for queue1 will preempt a process in queue2. A process in queue1
will in turn be preempted by a process arriving for queue0.
● A process entering the ready queue is put in queue0. A process in queue 0 is given a time
quantum of 8ms. If it does not finish within this time, it is moved to the tail of queue 1.
● If queue 0 is empty, the process at the head of queue1 is given a quantum of 16ms. If it
does not complete, it is preempted and is put into queue2.
● Processes in queue 2 are run on an FCFS basis but are run only when queues 0 and 1 are
empty.
● This scheduling algorithm gives highest priority to any process with a CPU burst of 8ms
or less. Such a process will quickly get the CPU and finish its CPU burst and go off to its
next I/O burst.
● Processes that need more than 8ms but less than 24ms are also served quickly, although
with lower priority than shorter processes.
● Long processes automatically sync to queue2 and are served in FCFS order with any
CPU cycles left over from queues0 and queue1.
A Multi-Level Feedback queue scheduler is defined by the following parameters:
● The number of queues.
● The scheduling algorithm for each queue.
● The method used to determine when to upgrade a process to a higher priority queue.
● The method used to determine when to demote a process to a lower priority queue.
● The method used to determine which queue a process will enter when that process needs
service.
THREAD SCHEDULING
Threads can be divided into two types: Kernel level threads and User level threads.
● Kernel-level threads are being scheduled by the operating system.
● User-level threads are managed by a Thread Library and the kernel is unaware of them.
● User-level threads must be mapped to an associated kernel-level thread to run on a CPU
Contention scope
● The thread library schedules user-level threads to run on an available Light Weight
Process. This scheme is known as Process-Contention Scope (PCS). There will be a
competition for the CPU among threads belonging to the same process.
● PCS is done according to priority. The scheduler selects the runnable thread with the
highest priority to run. User-level thread priorities are set by the programmer and are not
adjusted by the thread library.
● PCS will preempt the thread currently running in favor of a higher-priority thread.
● To decide which kernel-level thread to schedule onto a CPU, the kernel uses System-
Contention Scope (SCS). Competition for the CPU with SCS scheduling takes place
among all threads in the system.
● Windows, Linux and Solaris are the systems scheduled threads using only SCS.
MULTIPLE-PROCESSOR SCHEDULING
Scheduling process will become complex with multiple CPU structures but Load Sharing is
possible with multiple CPU structures.
In multiple processor systems, we can use any available processor to run any process in
the queue.
Load Balancing
Load balancing attempts to keep the workload evenly distributed across all processors in an
SMP system.
Load balancing is necessary only on systems where each processor has its own private queue
of processes to execute.
There are two approaches to load balancing: Push Migration and Pull Migration.
● Push migration: A specific process periodically checks the load on each processor. If
the task finds an imbalance then it evenly distributes the load by moving (pushing)
processes from overloaded processors to idle or less-busy processors.
● Pull migration: It occurs when an idle processor pulls a waiting process from a
busy processor.
Multicore Processors
In a multicore processor each core acts as a separate processor. Multicore processors may
complicate scheduling issues.
● When a processor accesses memory, it spends a significant amount of time waiting for the data
to become available. This waiting time is called a Memory Stall.
● Memory Stall may occur for several reasons for example Cache miss.
● In order to avoid memory stall, many recent hardware designs have implemented multithreaded
processor cores in which two or more hardware threads are assigned to each core. That way, if
one thread stalls while waiting for memory, the core can switch to another thread.
● The execution of thread0 and the execution of thread 1 are interleaved on a dual-threaded
processor core.
● From an operating-system perspective, each Hardware Thread appears as a Logical
Processor that is available to run a software thread.
● Thus, on a Dual-threaded, Dual-core system, Four logical processors are presented to the
operating system.
There are two ways to multithread a processing core: Coarse-grained and Fine-grained
Coarse-Grained Multithreading:
● A thread executes on a processor until a long-latency event such as a memory stall occurs.
● The processor must switch to another thread to begin execution, because of the delay
caused by the long-latency event.
● The cost of switching between threads is high, since the instruction pipeline must be
flushed before the other thread can begin execution on the processor core.
● Once this new thread begins execution, it begins filling the pipeline with its instructions.
3. When the process no longer needs access to the resource, it releases the resource and
the assignment edge is deleted.
Resource allocation graph shows three situations:
1. Graph with No deadlock
2. Graph with a cycle and deadlock
3. Graph with a cycle and no deadlock
Resource Allocation Graph without Deadlock
The below graph consists of three sets: Process P, Resources R and Edges E.
Consider the above graph, with processes and Resources and have some
edges: P1 → R1 → P2 → R3 → P3 → R2 → P1
P2 → R3 → P3 → R2 → P2
∙ Process P2 is waiting for the resource R3, which is held by process P3. ∙ Process
P3 is waiting for either process P1 or process P2 to release resource R2. ∙ Process
P1 is waiting for process P2 to release resource R1.
Hence the Processes P1, P2 and P3 are deadlocked.
Resource Allocation Graph with a Cycle and No Deadlock
processes. Example 2: Printer is a resource where only one process can use it.
∙ Sharable resources do not require mutually exclusive access and thus cannot be involved in
a deadlock. Example: Read-only files.
∙ If several processes attempt to open a read-only file at the same time, they can be
granted simultaneous access to the file. A process never needs to wait for a sharable
resource.
Hold and Wait
To ensure that the hold-and-wait condition never occurs in the system, we must guarantee that,
whenever a process requests a resource, it does not hold any other resources. ∙ Protocol 1:
Each process can request the resources and be allocated all its resources
before it begins execution. We can implement this provision by requiring that system
calls requesting resources for a process precede all other system calls.
Example: Consider a process that copies data from a DVD drive to a file on Hard disk,
sorts the file and then prints the results to a Printer.
If all resources must be requested at the beginning of the process, then the process must
initially request the DVD drive, disk file and Printer. It will hold the printer for its entire
execution, even though it needs the printer only at the end.
∙ Protocol 2: A process can be allowed to request resources only when it has none. A process
may request some resources and use them. Before it can request any additional resources, it
must release all the resources that it is currently allocated.
Example: Consider a process that copies data from a DVD drive to a file on Hard disk,
sorts the file and then prints the results to a Printer.
The process to request initially only the DVD drive and Hard disk file. It copies from the
DVD drive to the Hard disk and then releases both the DVD drive and the disk file. The
process must then request the Hard disk file and the Printer. After copying the disk file
to the printer, it releases these two resources and terminates.
Problem: Starvation and Low Resource utilization
∙ Resource utilization is low, since resources may be allocated but unused for a long period.
∙ A process that needs several resources may have to wait indefinitely leads to starvation.
No Preemption
To ensure that No preemption condition does not hold, we can use the following protocol: ∙ If
a process is holding some resources and requests another resource that cannot be immediately
allocated to it, then all resources the process is currently holding are preempted (i.e.)
resources are implicitly released.
∙ The preempted resources are added to the list of resources for which the process is waiting.
∙ The process will be restarted only when it can regain its old resources as well as the
new resources that it is requesting.
Note: This protocol is often applied to resources whose state can be easily saved and restored later
such as CPU registers and memory space. It cannot be applied to resources such as mutex
locks and semaphores.
Circular Wait
One way to ensure that circular wait condition never holds is to impose a total ordering of all
resource types and to require that each process requests resources in an increasing order of
enumeration.
Consider the set of resource types R={R1, R2, ..., Rm} and N be the set of natural
If the system can allocate resources to each process up to its maximum in some order and
still avoid a deadlock then the state is called Safe state.
∙ A system is in a safe state only if there exists a Safe sequence.
∙ A sequence of processes <P1, P2, ..., Pn> is a safe sequence for the current allocation state, if
for each process Pi, the resource requests that Pi can still make can be satisfied by the
currently available resources plus the resources held by all Pj, with j < i.
∙ In this situation, if the resources that Pi needs are not immediately available, then Pi can
wait until all Pj have finished.
∙ When Pj have finished its task, Pi can obtain all of its needed resources and after
completing its designated task Pi can return its allocated resources and terminate. ∙ When P i
terminates, Pi+1 can obtain its needed resources and so on.
∙ If no such sequence exists, then the system state is said to be unsafe.
Note:
1. A safe state is not a deadlocked state and a deadlocked state is an unsafe state. 2. An
unsafe state may lead to a deadlock but not all unsafe states are deadlocks. 3. As long as the
state is safe, the operating system can avoid unsafe and deadlocked states. 4. In an unsafe
state, operating system cannot prevent processes from requesting resources
in such a way that a deadlock occurs. Behavior of the processes controls unsafe
states.
Example: Consider a system with 12 magnetic tape drives and 3 processes: P0, P1 and P2.
Process Maximum Needs Current Needs
P0 10 5
P1 4 2
P2 9 2
∙ Now process P0 needs 5 tape drives and the system has 5 available tape drives. Hence P0
can get all its tape drives and it reaches its maximum 10 tape drives. After completing its task
P0 returns the resources to the system. Now system has 10 available tape drives.
∙ Now the process P2 needs 7 additional resources and system have 10 resources available.
Hence process P2 can get all its tape drives and return them. Now the system will have all
12 tape drives available.
Problem: Low Resource utilization
If a process requests a resource that is currently available, it may still have to wait.
Hence there exist a low resource utilization is possible.
Resource-Allocation-Graph Algorithm
In this algorithm we use three edges: request edge, assignment edge and a claim edge. ∙ Claim
edge Pi → Rj indicates that process Pi may request resource Rj at some time in the future.
∙ Claim edge resembles a request edge in direction but is represented by dashed line. ∙ When
process Pi requests resource Rj, the claim edge Pi → Rj is converted to a request edge.
∙ When a resource Rj is released by Pi, the assignment edge Rj → Pi is reconverted to a
claim edge Pi → Rj.
∙ The resources must be claimed a priori in the system. That is, before process Pi starts
executing, all its claim edges must already appear in the resource-allocation graph.
Now suppose that process Pi requests resource Rj.
∙ The request can be granted only if converting the request edge Pi → Rj to an assignment
edge Rj → Pi does not result in the formation of a cycle in the resource-allocation graph.
We check for safety by using a cycle-detection algorithm.
∙ If no cycle exists, then the allocation of the resource will leave the system in a safe state. ∙
If a cycle is found, then the allocation will put the system in an unsafe state. In that case,
process Pi will have to wait for its requests to be satisfied.
Example: consider the above resource-allocation graph. Suppose that P2 requests R2. ∙ R2
is currently free still we cannot allocate it to P2, since this will create a cycle in graph. ∙ A
cycle indicates that the system is in an unsafe state.
∙ If P1 requests R2 and P2 requests R1, then a deadlock will occur.
Problem: The resource-allocation-graph algorithm is not applicable to a resource allocation
system with multiple instances of each resource type.
BANKER’s ALGORITHM
Banker’s algorithm is used in a system with multiple instance of each resource type. The name
was chosen because the algorithm could be used in a banking system to ensure that the bank
never allocated its available cash in such a way that it could no longer satisfy the needs of all
its customers.
The Available vector can be calculated by subtractring total no of resources from the sum of resources
allocated to each process.
Available resources of A= Total resources of A – Sum of resources allocated to Process P1 to P4
we can decide whether the state is safe or not. After solving the above problem by using bankers
algorithm we will get to a safe state with safe sequence
<P1,P3,P4,P0,P2>.
Now we get a safe state, the resources will be granted immediately for requested process P1.
DEADLOCK DETECTION ALGORITHM
If a system does not employ either a Deadlock-Prevention or a Deadlock-Avoidance
algorithm then a deadlock situation may occur. In this environment, the system may provide:
∙ An algorithm that examines the state of the system to determine whether a deadlock has
occurred
∙ An algorithm to recover from the deadlock.
Deadlock Detection in Single Instance of Each Resource Type
If all resources have only a single instance then we can define a Deadlock-Detection
algorithm that uses a variant of the resource-allocation graph called a wait-for graph. We
obtain wait-for graph from the resource-allocation graph by removing the resource nodes and
collapsing the appropriate edges.
∙ An edge from Pi to Pj in a wait-for graph implies that process Pi is waiting for process Pj
to release a resource that Pi needs.
∙ An edge Pi → Pj exists in a wait-for graph if and only if the corresponding resource
allocation graph contains two edges Pi → Rq and Rq → Pj for some resource Rq .
∙ In above figure we present a resource-allocation graph and the corresponding wait-for
graph. A deadlock exists in the system if and only if the wait-for graph contains a cycle. ∙
To detect deadlocks, the system needs to maintain the wait-for graph and periodically
invoke an algorithm that searches for a cycle in the graph.
∙ An algorithm to detect a cycle in a graph requires an order of n2operations, where n is
the number of vertices in the graph.
Several Instances of a Resource Type
The wait-for graph scheme is not applicable to a resource-allocation system with multiple
instances of each resource type.
We will implement a Deadlock Detection algorithm that is similar to the Banker’s
algorithm. The data structures used in Deadlock Detection algorithm is:
∙ Available: A vector of length m indicates the number of available resources of each type. ∙
Allocation: An n × m matrix defines the number of resources of each type currently allocated
to each process.
∙ Request: An n × m matrix indicates the current request of each process. If
Request[i][j]==k, then process Pi is requesting k more instances of resource type Rj.
The detection algorithm described here simply investigates every possible allocation
sequence for the processes that remain to be completed.
1. Let Work and Finish be vectors of length m and n, respectively. We Initialize
Work = Available. For i = 0, 1, ..., n–1.
if Allocationi != 0, then Finish[i] = false.
Otherwise, Finish[i] = true.
2. Find an index i such that both
a. Finish[i] == false
b. Requesti ≤ Work
If no such i exists, go to step 4.
3. Work = Work + Allocationi
Finish[i] = true
Go to step 2.
4. If Finish[i] == false for some i, 0 ≤ i < n, then the system is in a deadlocked state.
Moreover, if Finish[i] == false, then process Pi is deadlocked.
5. This algorithm requires an order of m × n2operations to detect whether the system is in a
deadlocked state.
6. Example:
7. Consider a system with 5 processes: P0, P1, P2, P3, P4 and 3 resource types A, B and C
with 10, 5, 7 instances respectively. (i.e.) . Resource type A=7, B= 2 and C=6 instances.
Suppose that, at time T0, we have the following resource-allocation state:
Allocation Request Available
ABC ABC ABC
P 010 000 000
0
P 200 202
1
P 303 000
2
P 211 100
3
P 002 002
4
Initially the system is not in Deadlock State. If we apply the Deadlock Detection algorithm we will find the
sequence < P0, P2, P3, P1, P4 > results in Finish[i] == true for all i. The system is in safe state hence there is
no deadlock
RECOVERY FROM DEADLOCK
There are two options for breaking a deadlock.
1. Process termination
2. Resource Preemption
Process Termination
To eliminate deadlocks by aborting a process, we use one of two methods. In both
methods, the system reclaims all resources allocated to the terminated processes.
∙ Abort all Deadlocked processes: This method clearly will break the deadlock cycle, but at
great expense. The deadlocked processes may have computed for a long time and the
results of these partial computations must be discarded and probably will have to be
recomputed later.
∙ Abort one process at a time until the Deadlock cycle is eliminated: This method
incurs considerable overhead, since after each process is aborted, a deadlock-
detection algorithm must be invoked to determine whether any processes are still
deadlocked.
Many factors may affect which process is chosen for
preempting includes: 1. Priority of the process.
2. How long the process has computed and how much longer the process will compute
before completing its designated task.
3. How many and what types of resources the process has used.
Resource Preemption
To eliminate deadlocks using resource preemption, we successively preempt some
resources from processes and give these resources to other processes until the deadlock
cycle is broken. There are 3 issues related to Resource Preemption:
1. Selecting a victim. As in process termination, we must determine the order of
preemption to minimize cost. Cost factors may include the number of resources a
deadlocked process is holding and the amount of time the process has thus far
consumed.
2. Rollback. If we preempt a resource from a process then the process cannot continue
with its normal execution. It is missing some needed resource. We must do total roll
back of the process and restart it from that state: abort the process and then restart it.
3. Starvation. How do we ensure that starvation will not occur? That is, how can we
guarantee that resources will not always be preempted from the same process? In
a system where victim selection is based on cost factors, it may happen that the
same process is always picked as a victim. As a result, this process never
completes its task which leads to starvation. Hence we must ensure that a process
can be picked as a victim only a finite number of times. The solution is to include
the number of rollbacks in the cost factor.